Some most common cyber crimes

Theft reviewed, phishing, extracting money or government and industrial cyber espionage, information are some of the highlights from security companies. Now Entelgy has done his own summary of these threats by taking account of the most recorded last year.

As explained from Inteco, only Spain recorded 54,000 cyber attacks in 2013 . PandaLabs gave another record data for that year. In a single year, 30 million new malware samples created, which is 82,000 a day. Only in 2013 was 20% of all malware ever recorded.

The National Cryptologic Centre (attached to the National Center for Intelligence agency) managed in Spain 7,260 cyber incidents against systems of Public Administrations , enterprises and organizations of national strategic interest (energy, financial, security and defense, telecommunications etc.). In such a digitized and connected world, the structures are key points for this type of attack.

Gianluca D’Antonio, president of the Spanish Association of Information Security descataba for ABC last year that cyber security was to be key to the States and Spain. “Our vision at Spanish Security Association is that cybersecurity must become a public good, such as health, or public safety,” he said.

2 – Government cyber espionage: theft of information from government agencies such as the “Red October” operation that infiltrated the networks of diplomatic, government communications, scientific research and petrochemical companies from about 40 countries. The aim was to obtain sensitive information and access credentials computers, mobile devices and network equipment.

3 – Cyber ​​attacks on critical infrastructure, as detected with Aramco, the biggest oil company of Saudi Arabia, which was rocked by a Trojan installed on over 30,000 computers on your network. The company needed ten days to return to normal.

4 – Cibermercenarios or groups of hackers with advanced knowledge, hired to develop attacks directed at a specific target, in order to get the desired information.

5 – Cyber crime against financial services, and in particular, the so-called banking Trojans designed to steal credit card data and increasingly focused on mobile devices. For example, in “Operation High Roller” 60 financial institutions worldwide, victims of a cyber attack in which 60 million euros were extracted. The degree of sophistication of the malware suggests it was the work of organized crime because the configuration of the attack required investment for development, many hours of work and an important logistics.

6 – Isolated Cyber criminals, sell the information obtained to the highest bidder. A high-profile example was the U.S. chain of department stores Target acknowledged stealing credit card information of about 70 million customers. A few days later, these cards were being sold on the black market to be cloned and shop with them.

8 – Infection through web pages, In 2013, Blackole, an exploit-kit (pack containing malware) author was arrested, that allowed to exploit vulnerabilities and infect legitimate websites to users accessing these pages, millions around the world.

9 – Ciberhacktivistas : individuals or groups who, moved by some ideology, seek to undermine the structure of the opponent. The paradigmatic example is Anonymous, and in these cases, their attacks tend to focus on DDoS attacks, website defacement or publication of compromised data.

10 – Cyber-sabotage, that seeks to damage the reputation of an organization as well as its operation. Proof of this is the activity of the Syrian Electronic Army, which has spent months attacking all those who, in your opinion, spread hate and want to destabilize security in Syria, including major media companies worldwide. Reached even cause a fall of 150 points on the Dow Jones Industrial Average (stock index of the 30 largest companies in the U.S. stock market), to a false report of an attack on the White House released by Associated Press on Twitter.